Security

Expert security suite reviews, firewalls, encryption, spam blockers, ad blockers and price comparisons on products from all the top brands

google home mini
security audit word cloud

endpoint protection gears

The new endpoint security market: Growing in size and scope

Massive funding rounds by CrowdStrike and Cylance demonstrate that endpoint security may be the tip of the cybersecurity spear.

Man with briefcase walking with female executive

The story of Mary

Good information security isn't just about the 1s and 0s.

4 encryption keys

Hardware, software options emerge for runtime encryption

Hackers are getting better at exploiting encryption gaps that expose plain-text data. New hardware and software runtime encryption solutions aim to close those gaps.

subway station 87638274

China increases its surveillance state

China plans to add bio-recognition technology to subways and to install RFID chips in vehicle windshields.

Black Hat 2015

The CSO guide to top security conferences

CSO Online’s calendar of upcoming security conferences makes it easy to find the events that matter the most to you.

Man pointing to security icon for email

When your career is derailed by your girlfriend tampering with your email

Eric Abramovitz, a gifted clarinetist, had opportunity squandered when his girlfriend executed a classic "business email compromise."

network security digital internet firewall binary code

Review: Corelight is a worthy network packet sniffer

In the tradition of other great network analysis tools like Bro and Sourcefire, Corelight gives security pros deep insight into data traffic on the systems they defend.

Windows security and protection [Windows logo/locks]

Microsoft brings cloud security services to better protect Windows 10

Windows 10 Advanced Threat Protection and new Microsoft 365 Business security features make it easier to detect threats ad stop cyber attacks.

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

hacker presence on a network

Researchers disclose 7 flaws in 390 Axis IP cameras, remote attacker could take control

If an attacker were to chain three of the flaws in the Axis IP cameras, they could remotely execute shell commands with root privileges. Update your firmware now.

insurance policy

Does cyber insurance make us more (or less) secure?

Underwriting cyber risk remains more art than science, but in the absence of regulation, cyber insurance might still be the best hope for improving cybersecurity practices across the board — at least for now.

rog

Gamers: Is Red Shell 'spyware' being used in the games you play?

Some game developers use Red Shell to fingerprint gamers for marketing purposes, and gamers are not happy, forcing many to remove it.

jobs collaboration careers network

Security executives on the move and in the news

Find up-to-date news of CSO, CISO and other senior security executive appointments.

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

mit csail ai artificial intelligence

MIT's AI can now 'see' and track people through walls using wireless signals

The RF-Pose system developed by MIT's Computer Science and Artificial Intelligence Laboratory (CSAIL) can track a person through walls or identify one specific person out of a group of 100.

cloud security

What is a CASB? What you need to know before you buy

Cloud access security brokers have come a long way in a few years and can be an effective way to manage authentication and encryption across cloud and on-premise systems.

leading digital transformation puppet

Leveraging digital transformation

Data protection plays a key part in digital transformation adoptions, changes to existing practices and reforming company culture. Digital transformation expert Vic Tingler discusses how businesses can digitally transform to increase...

pc antivirus

The best antivirus software? Kaspersky, Symantec and Trend Micro lead in latest tests

Ransomware and other threats often get through signature-based antivirus protection, giving it a bad rap. However, Windows antivirus tools still play an important role in the enterprise security strategy.

Load More